Nov 20, 2020

November


I have been hacked. Still trying to figure out the extension and number of hacked accounts. 

I have changed my passwords a couple of times, but still things are happening. I lost access to my previous blogs (namely B2OB, Blogtese), and the capacity to change settings in other accounts that where connected to an email account that I stopped using almost 10 years ago. That account was compromised and someone as been subscribing things with my personal data through that account. Other accounts that I created a long time ago, connected to that email, are also compromised, like flickr where I tried to change my email and it sends me to an error page. If you receive anything you consider unusual through my channels, it might be because it's not me. Hope you know me well enough to figure it out.

The hacking was gradual and it might take some time to get to now the extension of it all. Because we have everything so connected to our emails and phone that it becomes unpredictable and easy to exploit by people whose aim is to do harm.

And yes, I use anti-virus and I do not click is ads and I even stop reading journals, news and other informative site (like public national TV online!) because they make me loose the right to my privacy and install an «army» of data collection cookies on my artefacts.

So, if you know me, you know how to contact me if you want to. 

Image by Monica Pinheiro, license CC BY-NC-SA (CC).

Nov 18, 2020

November

 My computer does not allow me to uninstall Xbox Network and it connects by itself. Microsoft does not let users decide what games they want to play and when? I don´t want to play this game and I don´t want to have it in this computer. 

Nov 16, 2020

Systemic risks


"The first generation of AI-enabled offensive tools is already emerging and there is growing evidence of AI being used by attackers. Deep fakes have already been leveraged to create new cyberattack vectors and voice-mimicking software has been used in major thefts." in Cybersecurity, emergingtechnology and systemic risk (2020) by World Economic Forum in collaboration with the University of Oxford. Image by Monica Pinheiro, license CC BY-NC-SA (CC).

Cyber criminals


"Attackers will often use a tool called a ‘web inject’ to monitor the internet browsing of an infected user. When the victim attempts to access their normal internet banking platform, the malware will serve up a fake web page that looks exactly like their real online banking web page. It will steal the victim’s login details and password, and trick the user into entering their token authentication, or SMS authentication, so that the attacker can quickly replicate the process on the genuine web page in order to get access to (and steal from) the account." in Cyber crime: understanding the online business model, by Matt Carey Head of London Operations Team, NCSC. Image by Monica Pinheiro, license CC BY-NC-SA (CC).